Privacy-Preserving Biometric Verification With Handwritten Random Digit String

被引:0
作者
Zhang, Peirong [1 ]
Liu, Yuliang [2 ]
Lai, Songxuan [3 ]
Li, Hongliang [1 ]
Jin, Lianwen [1 ,4 ]
机构
[1] South China Univ Technol, Sch Elect & Informat Engn, Guangzhou 510641, Peoples R China
[2] Huazhong Univ Sci & Technol, Sch Artificial Intelligence & Automat, Wuhan 430074, Peoples R China
[3] Huawei Cloud Comp Technol Co Ltd, EI Prod Dept, Shenzhen 430074, Peoples R China
[4] SCUT Zhuhai Inst Modern Ind Innovat, Zhuhai 519100, Peoples R China
基金
中国国家自然科学基金;
关键词
Writing; Forgery; Biometrics; Privacy; Biological system modeling; Data privacy; Training; Social networking (online); Blockchains; Authentication; Handwriting verification; privacy-preserving; biometrics; random digit string; ONLINE SIGNATURE VERIFICATION; WRITER IDENTIFICATION; RECOGNITION; NETWORKS;
D O I
10.1109/TPAMI.2025.3529022
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Handwriting verification has stood as a steadfast identity authentication method for decades. However, this technique risks potential privacy breaches due to the inclusion of personal information in handwritten biometrics such as signatures. To address this concern, we propose using the Random Digit String (RDS) for privacy-preserving handwriting verification. This approach allows users to authenticate themselves by writing an arbitrary digit sequence, effectively ensuring privacy protection. To evaluate the effectiveness of RDS, we construct a new HRDS4BV dataset composed of online naturally handwritten RDS. Unlike conventional handwriting, RDS encompasses unconstrained and variable content, posing significant challenges for modeling consistent personal writing style. To surmount this, we propose the Pattern Attentive VErification Network (PAVENet), along with a Discriminative Pattern Mining (DPM) module. DPM adaptively enhances the recognition of consistent and discriminative writing patterns, thus refining handwriting style representation. Through comprehensive evaluations, we scrutinize the applicability of online RDS verification and showcase a pronounced outperformance of our model over existing methods. Furthermore, we discover a noteworthy forgery phenomenon that deviates from prior findings and discuss its positive impact in countering malicious impostor attacks. Substantially, our work underscores the feasibility of privacy-preserving biometric verification and propels the prospects of its broader acceptance and application.
引用
收藏
页码:3049 / 3066
页数:18
相关论文
共 87 条
[1]   Usage of autoencoders and Siamese networks for online handwritten signature verification [J].
Ahrabian, Kian ;
BabaAli, Bagher .
NEURAL COMPUTING & APPLICATIONS, 2019, 31 (12) :9321-9334
[2]   Online Signature Verification using Time Warp Edit Distance based kernel [J].
Auddya, Sarojit ;
Singh, Rajat Kumar ;
Sundaram, Suresh .
2020 17TH INTERNATIONAL CONFERENCE ON FRONTIERS IN HANDWRITING RECOGNITION (ICFHR 2020), 2020, :319-324
[3]   Online Arabic Handwritten Digits Recognition [J].
Azeem, Sherif Abdel ;
El Meseery, Maha ;
Ahmed, Hany .
13TH INTERNATIONAL CONFERENCE ON FRONTIERS IN HANDWRITING RECOGNITION (ICFHR 2012), 2012, :135-140
[4]  
Bai SJ, 2018, Arxiv, DOI [arXiv:1803.01271, DOI 10.48550/ARXIV.1803.01271]
[5]   Advancing COVID-19 diagnosis with privacy-preserving collaboration in artificial intelligence [J].
Bai, Xiang ;
Wang, Hanchen ;
Ma, Liya ;
Xu, Yongchao ;
Gan, Jiefeng ;
Fan, Ziwei ;
Yang, Fan ;
Ma, Ke ;
Yang, Jiehua ;
Bai, Song ;
Shu, Chang ;
Zou, Xinyu ;
Huang, Renhao ;
Zhang, Changzheng ;
Liu, Xiaowu ;
Tu, Dandan ;
Xu, Chuou ;
Zhang, Wenqing ;
Wang, Xi ;
Chen, Anguo ;
Zeng, Yu ;
Yang, Dehua ;
Wang, Ming-Wei ;
Holalkere, Nagaraj ;
Halin, Neil J. ;
Kamel, Ihab R. ;
Wu, Jia ;
Peng, Xuehua ;
Wang, Xiang ;
Shao, Jianbo ;
Mongkolwat, Pattanasak ;
Zhang, Jianjun ;
Liu, Weiyang ;
Roberts, Michael ;
Teng, Zhongzhao ;
Beer, Lucian ;
Sanchez, Lorena E. ;
Sala, Evis ;
Rubin, Daniel L. ;
Weller, Adrian ;
Lasenby, Joan ;
Zheng, Chuangsheng ;
Wang, Jianming ;
Li, Zhen ;
Schonlieb, Carola ;
Xia, Tian .
NATURE MACHINE INTELLIGENCE, 2021, 3 (12) :1081-1089
[6]   Speaker recognition: A tutorial [J].
Campbell, JP .
PROCEEDINGS OF THE IEEE, 1997, 85 (09) :1437-1462
[7]   Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data [J].
Cao, Ning ;
Wang, Cong ;
Li, Ming ;
Ren, Kui ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) :222-233
[8]  
Chavan Manoj, 2017, 2017 INT C COMPUTING
[9]   Letter-Level Online Writer Identification [J].
Chen, Zelin ;
Yu, Hong-Xing ;
Wu, Ancong ;
Zheng, Wei-Shi .
INTERNATIONAL JOURNAL OF COMPUTER VISION, 2021, 129 (05) :1394-1409
[10]  
Chuang Li, 2019, 2019 International Conference on Document Analysis and Recognition (ICDAR). Proceedings, P526, DOI 10.1109/ICDAR.2019.00090